• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
apple hurries patches for safari bugs under active attack

Apple Hurries Patches for Safari Bugs Under Active Attack

You are here: Home / Latest Cyber Security Vulnerabilities / Apple Hurries Patches for Safari Bugs Under Active Attack
June 15, 2021

Apple patched two bugs impacting its Safari browser WebKit motor that it claimed are actively staying exploited.

Apple issued two out-of-band security fixes for its Safari web browser, repairing zero-day vulnerabilities that “may have been actively exploited,” according to a Monday security bulletin by the corporation. The bugs affect sixth-generation Apple iPhones, iPads and iPod contact design hardware, released among 2013 and 2018.

“Apple is aware of a report that this issue may perhaps have been actively exploited,” the enterprise wrote. Technological particulars of the two bugs, Apple mentioned, will not be introduced, “until an investigation has occurred and patches or releases are readily available.”
Both of those bugs are tied to Apple’s Safari browser and the fundamental iOS code, named WebKit, which is dependable for rendering web internet pages. Apple is crediting the discovery of both bugs (CVE-2021-30761 and CVE-2021-30762) to an anonymous researcher.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The patch, iOS 12.5.4, is out there for download.

Memory Corruption Bug: CVE-2021-30761

A person of the bugs patched by Apple addresses a “memory corruption issue” and increases the Apple WebKit point out administration.

“State administration refers to the administration of the condition of a person or a lot more person interface controls this sort of as text fields, Ok buttons, radio buttons, etcetera. in a graphical person interface,” according to a complex description of the phrase.

According to Apple, the patch for the bug, logged as CVE-2012-30761, addresses a bug discovered in iPhone 5s, iPhone 6, iPhone 6 As well as, iPad Air, iPad mini 2, iPad mini 3, and iPod contact (6th era). This selection of hardware was released in between 2013 and 2018.

Use Right after No cost Flaw: CVE-2021-30762

The second flaw was discovered as a use-soon after-cost-free bug, which is a style of memory corruption vulnerability. The bug, tracked as CVE-20121-30762, will allow an attacker to execute code on specific equipment. According to Apple, adversaries could be exploiting this flaw on unpatched devices.

In its advisory Apple wrote: “Impact: Processed maliciously crafted web content material may well lead to arbitrary code execution. Apple is knowledgeable of a report that this issue may well have been actively exploited.”

Apple added that the “use-right after-cost-free issue was resolved with improved memory management.”

“[A] use-following-absolutely free is a vulnerability [is] relevant to incorrect use of dynamic memory all through plan procedure. If immediately after releasing a memory place, a system does not clear the pointer to that memory, an attacker can use the error to hack the system,” in accordance to a Kaspersky description of this variety of bug.

The iOS patch, distributed as a iOS 12.5.4 update, is for the exact same model components as previously mentioned: iPhone 5s, iPhone 6, iPhone 6 In addition, iPad Air, iPad mini 2, iPad mini 3, and iPod contact (6th technology).

Apple is not releasing any supplemental facts pertaining to these vulneraries.

Sign up for Threatpost for “Tips and Strategies for Far better Menace Hunting” — a Live event on Wed., June 30 at 2:00 PM ET in partnership with Palo Alto Networks. Study from Palo Alto’s Unit 42 experts the most effective way to hunt down threats and how to use automation to assistance. Sign-up Listed here for free. 


Some elements of this posting are sourced from:
threatpost.com

Previous Post: «instagram‌ ‌bug allowed anyone to view private accounts without following Instagram‌ ‌Bug Allowed Anyone to View Private Accounts Without Following Them
Next Post: Experts Shed Light On Distinctive Tactics Used by Hades Ransomware experts shed light on distinctive tactics used by hades ransomware»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.